Categories: Security

What You Should Know About China’s New Cybersecurity Law

In an effort to prevent Chinese citizens and businesses from hacking threats and international spying, China has approved a new cybersecurity law that is intended to increase the country’s control over technology and information. Further, censorship of information is not only encouraged, but is now an element of their cybersecurity plan. The cybersecurity law will increase surveillance of the internet in China, by also requiring that Chinese citizens use their real names and information for all websites or social media networks.

The cybersecurity law has been criticized by foreign governments, in addition to top security and economy experts, as being harmful to the Chinese economy. It may also be ineffective at actually improving national cybersecurity — if that’s really the government’s concern. Beginning next year, the cybersecurity law will be strictly enforced and the Chinese government will attempt to control and regulate the internet in China.

Read More: What Does the Government Spend on Cybersecurity?

How This Could Increase Security Threats

Domestic and foreign businesses operating in China will be affected by this law, although it is still unclear precisely how they will be affected other than censorship. Businesses will be required to report security breaches to the Chinese government and inform citizens of any security breaches. While this is a good cybersecurity measure in theory, it could be easily taken advantage of by the Chinese government.

According to the Economist, China wants domestic and foreign businesses to pass on any information or data relevant to China to the Chinese government for safe storage. Many businesses fear that this may result in an increased risk of data theft, or worse, jeopardize the security of businesses and their products by requiring that businesses get approval for security measures and software. Remember Apple’s refusal to provide the US government with a “key” to bypass their security measures and allow access to a locked iPhone? This law is similar in that it could require businesses to give a “key” to the Chinese government. That business’s security information could then be more vulnerable to hacking opportunities, or sold to state-sponsored groups or other governments. Many foreign governments fear that this could be taken a step further, and used to favor Chinese businesses over foreign businesses.

Protect Your Device From Security Threats

Security threats and other types of malware are increasingly common issues in the technological age. As governments increase their cybersecurity efforts, do your part by increasing the security of your device and information. Download antivirus software, such as DFNDR, to protect your Android against malware 24/7.

PSafe Newsroom

The dfndr blog is an informative channel that presents exclusive content on security and privacy in the mobile and business world, with tips to keep users protected. Populated by a select group of expert reporters, the channel has a partnership with dfndr lab's security team. Together they bring you, first-notice news about attacks, scams, internet vulnerabilities, malware and everything affecting cybersecurity.

Recent Posts

Vulnerabilities in Cyber Security: what they are and how to fix them?

Learn all about one of the hackers' favorite breach method and keep your company safe…

1 year ago

3 ways to recover deleted photos on Android

Have you ever wondered how to recover deleted photos on Android? After all, the lack…

1 year ago

What is worm?

Digital worms are among the most serious threats in the wild kingdom of the Internet.

2 years ago

Spoofing: What’s it all about?

Spoofing is a fairly sophisticated virtual scam that can fool even the most cautious and…

2 years ago

Careful With That QR Code! Five Steps For QR Code Safety

Five Steps to Reduce QR Code Risk! Step one? Read this article…

2 years ago

Pharming: Phishing’s Nasty Big Brother

Pharming is creating a new, dangerous brand of impostor syndrome. Check how to avoid pharming…

2 years ago